Reliable data transfer over a perfectly reliable channel r, Computer Networking

Assignment Help:

Reliable  data transfer  over a perfectly reliable channel rdt 1.0

First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protocols  itself  which in  trivia. The finite state  machine  definition for  the rdt 1.0 sender  and receiver are shown  in the FSM  in  defines the  operation of the sender while  the s FSM  defines the operation  of the  defines receiver. It is important  to note  that  there are separate FSM  for the  sender  and  of the receiver. The sender an deceiver FSM in figure  each have just  one  state. The  arrows  in the FSM  description indicate the transition of the protocols from one  state to another. The event causing the transition is shown above  the horizontal line  labelling the transition and the  actions  taken  when the  event occurs are shown below  the horizontal  lien when  no action  is taken  on an event  or no event  occurs   and an  action is  taken we  use the symbol a below or above the horizontal respectively  to explicitly denote the lack  of an action or event. The  initial  state of the FSM  is indicated by the  dashed arrow.

 

409_rdt a protocol for a completely  reliable  channel.png

 


                               Figure  rdt a protocol for a completely  reliable  channel

The sending  side of rdt  simply  accepts  data from  the upper  layer via the rdt send  event,  creates a packet  containing the data   and sends  the packet into the channel. The rdt send event would  result form  procedure call  by the upper layer  application.

On the receiving  side  rdt receives  a packet  from the  underlying channel via the rdt _rev event removes tha data from the  packet and passes the data  up to the upper layer. The  rdt_ rcv event would  result  from a procedure call  event from the lower layer  protocols.

In  this protocols  there  is no  difference  between a unit  of  data  and  a packet. Also  all packet  flow is  from  the sender  to receiver with a  perfectly  reliable  channel  there  is no  need for the  receiver  side to provide  any feedback to the sender.

 


Related Discussions:- Reliable data transfer over a perfectly reliable channel r

Whcih is the routing metric used by rip, Routing Information Protocol (RIP)...

Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops are considered unreachable. RIP upd

Define the term - public knowledge information, Define the term - public kn...

Define the term - public knowledge information It is essential to distinguish between public knowledge information and the more detailed pieces of information relating to spec

Give examples of icmp, Ping and Traceroute are used by ICMP for Testing. ...

Ping and Traceroute are used by ICMP for Testing. Destination Unreachable messages are obtained by a router when it does not have a route to the network.

Fiber optic cable - computer network, Fiber Optic Cable A fiber  opt...

Fiber Optic Cable A fiber  optic  cable is made  of glass or plastic and transmits signals in the form of light pulses. An optical fiber  is a thin  flexible medium  conducts

Database management, University of Wolverhampton School of Technology 6CI00...

University of Wolverhampton School of Technology 6CI007 Database Server Management Resit Assessment Hand in December 14th 2012 In this assignment you will build a small database t

Advantages and disadvantages of client-server method, 1. Write a critical a...

1. Write a critical analysis of the client/server vs. service architecture method for developing service architectures.  You must explain what the client/server method is in terms

Explain router, Router A router is used to route (transfer) data among ...

Router A router is used to route (transfer) data among two or more same networks. It verifies the next network point to which a data packet should be forwarded. The router is l

Internet service provider (isp), Internet  Service Provider (ISP) Thi...

Internet  Service Provider (ISP) This  supper fast  network  spanning  the world  from  one major  metropolitan area to another  is provided  by a handful of national internet

Ipx traffic on a network, To monitor ipx traffic on a network, what command...

To monitor ipx traffic on a network, what command would we use? Ans) show ipx traffic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd